追蹤
Khalid Bijon
Khalid Bijon
Snowflake
在 snowflake.com 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
732013
Constraints specification in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), 131-144, 2013
412013
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
402015
Risk-Aware RBAC Sessions
KZ Bijon, R Krishnan, R Sandhu
Eighth International Conference on Information Systems Security, 2012
402012
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
392013
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
K Bijon, MM Haque, R Hasan
12th International Conference on Privacy, Security and Trust (PST), 2014
262014
RT-based administrative models for community cyber security information sharing
R Sandhu, KZ Bijon, X Jin, R Krishnan
7th International Conference on Collaborative Computing: Networking …, 2011
182011
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
162016
A formal model for isolation management in cloud infrastructure-as-a-service
KZ Bijon, R Krishnan, R Sandhu
International Conference on Network and System Security, 41-53, 2015
162015
Dynamic shared data object masking
A Avanes, KZ Bijon, D Carru, T Cruanes, V Jain, Z Mi, S Muralidhar
US Patent 10,867,063, 2020
152020
The overhead from combating side-channels in cloud systems using VM-scheduling
N Juma, J Shahen, K Bijon, M Tripunitara
IEEE transactions on dependable and secure computing 17 (2), 422-435, 2018
152018
Virtual resource orchestration constraints in cloud infrastructure as a service
K Bijon, R Krishnan, R Sandhu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
152015
Row-level security
A Avanes, KZ Bijon, Z Mi, S Muralidhar, D Schultz, J Xu
US Patent 11,397,826, 2022
122022
Container-centric Access Control On Database Objects
A Avanes, K Bijon, P Povinec
US Patent App. 16/745,922, 2021
112021
Risk-aware sessions in role based access control systems and methods of use
R Krishnan, RS Sandhu, K Bijon
US Patent App. 14/505,388, 2020
102020
A group-centric model for collaboration with expedient insiders in multilevel systems
KZ Bijon, R Sandhu, R Krishnan
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
92012
Object dependency tracking in a cloud database system
R Balakrishnan, KZ Bijon, S Muralidhar, D Schultz, J Xu
US Patent 11,347,730, 2022
82022
System for implementing an object tagging framework
A Avanes, KZ Bijon, Y Li, Z Mi, S Muralidhar, D Schultz
US Patent 11,301,478, 2022
62022
Remote execution using a global identity
KZ Bijon, D Carru, CP Child, E Karlson, Z Mi
US Patent 11,057,491, 2021
62021
Constraints for attribute based access control with application in cloud IaaS
KZ Bijon
The University of Texas at San Antonio, 2015
62015
系統目前無法執行作業,請稍後再試。
文章 1–20